Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security"
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Tools, Software Development Life Cycle, Technical Design, Security Engineering
Microsoft
Skills you'll gain: Network Security, Network Protocols, TCP/IP, Cloud Computing, Firewall, Cloud Services, Cybersecurity, General Networking, Networking Hardware, Network Architecture, OSI Models, Microsoft Azure, Computer Networking, Network Infrastructure, Virtualization, Microsoft Servers
Skills you'll gain: Incident Response, Disaster Recovery, Incident Management, Computer Security Incident Management, Business Continuity, Security Management, Cyber Security Policies, Investigation, Threat Detection, Threat Management, Communication Strategies
DeepLearning.AI
Skills you'll gain: Data Pipelines, Data Architecture, Requirements Analysis, Amazon Web Services, Data Warehousing, Data Integration, Data Processing, System Requirements, Performance Tuning, Security Controls, Cloud Computing, Data Transformation, Real Time Data, Scalability
Skills you'll gain: Application Deployment, Cloud Infrastructure, CI/CD, Cloud Security, Service Level Agreement, Microservices, Service Level, Google Cloud Platform, Network Architecture, API Design, Site Reliability Engineering, Cloud Computing Architecture, Kubernetes, Restful API, Infrastructure Architecture, Cloud Storage, Cloud Applications, Key Performance Indicators (KPIs), DevOps, Data Storage
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Remote Access Systems, Linux Commands, TCP/IP, Scripting, MySQL, Data Structures
Skills you'll gain: Web Services, Python Programming, Restful API, Automation, Scripting, Email Security, Application Programming Interface (API), JSON, Data Import/Export, Debugging
Skills you'll gain: System Configuration, Configuration Management, Cybersecurity, Security Awareness, Data Security, Security Controls, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Information Technology Operations, System Monitoring, Key Management, General Networking, Data Integrity
Skills you'll gain: API Design, Restful API, API Gateway, Application Programming Interface (API), Cloud API, Application Lifecycle Management, Proxy Servers, Cloud Applications, Software Design Documents, Software Documentation, Google Cloud Platform, Authentications
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Threat Intelligence, Cyber Risk, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Law, Regulation, and Compliance
EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Security Awareness, Cyber Threat Intelligence, Cybersecurity, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
- Status: New
Microsoft
Skills you'll gain: CI/CD, Cascading Style Sheets (CSS), GitHub, Database Management, C# (Programming Language), Microsoft SQL Servers, HTML and CSS, SQL, ASP.NET, Load Balancing, Continuous Integration, Version Control, Relational Databases, Git (Version Control System), Scalability, Full-Stack Web Development, Back-End Web Development, Programming Principles, Graph Theory, User Interface and User Experience (UI/UX) Design
In summary, here are 10 of our most popular cyber security courses
- Secure Software Design:Â University of Colorado System
- Introduction to Secure Networking:Â Microsoft
- Incident Response and Recovery:Â ISC2
- Introduction to Data Engineering:Â DeepLearning.AI
- Reliable Google Cloud Infrastructure: Design and Process:Â Google Cloud
- Akamai Network Engineering:Â Akamai Technologies, Inc.
- Automating Real-World Tasks with Python:Â Google
- Security Operations:Â ISC2
- API Design and Fundamentals of Google Cloud's Apigee API Platform:Â Google Cloud
- Homeland Security and Cybersecurity Future:Â University of Colorado System